Tinjauan Literatur: Evaluasi Metode Least Significant Bit (LSB) dalam Steganografi Berdasarkan Alasan Penggunaan dan Efektivitasnya terhadap Keamanan Data Digital
DOI:
https://doi.org/10.62671/jikum.v2i2.241Keywords:
Steganography, Least Significant Bit, Data Security, Systematic Literature Review, Digital Data Security.Abstract
The rapid development of information technology has facilitated the exchange of digital data, but it has also given rise to various threats to information security. Steganography is one technique used to hide confidential data, with the Least Significant Bit (LSB) method being the most widely used approach due to its simplicity. This article aims to evaluate the reasons for using the LSB method in steganography, its weaknesses, and its effectiveness in digital data security. This study uses the Systematic Literature Review (SLR) method by reviewing relevant scientific articles obtained through the Google Scholar database. The literature selection process was carried out systematically using the PRISMA protocol. The results of the study show that the LSB method is widely used because of its ease of implementation, processing speed, adequate insertion capacity, and ability to maintain the visual quality of the disguised image. However, this method has limitations, particularly low resistance to noise, lossy compression, image manipulation, and steganalysis attacks when used alone. Therefore, the LSB method is considered quite effective for visual concealment, but it needs to be combined with additional security techniques to improve digital data security.
References
Al Akbar, A., Sumadi, M. T., & Faldi, F. (2024). Implementation of Lsb and Playfair Methods To Secure Text Files Into Wav Audio Files. Jurnal Teknik Informatika (Jutif), 5(6), 1529–1537. https://doi.org/10.52436/1.jutif.2024.5.6.1793
Habibi, R., & Manurung, A. G. R. (2023). SLR Systematic Literature Review: Metode Penilaian Kinerja Karyawan Menggunakan Human Performance Technology. Journal of Applied Computer Science and Technology, 4(2), 100–107. https://doi.org/10.52158/jacost.v4i2.511
Hasan, N. F., Dengen, C. N., & Ariyus, D. (2020). Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale. Digital Zone: Jurnal Teknologi Informasi Dan Komunikasi, 11(1), 20–29. https://doi.org/10.31849/digitalzone.v11i1.3413
Joshi, R., Gagnani, L., & Pandey, S. (2013). Image Steganography With LSB. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(1), 228–229.
Mido, A. R., & Ujianto, E. I. H. (2022). ANALISIS PENGARUH CITRA TERHADAP KOMBINASI KRIPTOGRAFI RSA DAN STEGANOGRAFI LSB. Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK), 9(2), 279–286.
Mohan, K. J., & Saini, A. K. (2023). Assessing Information Security Governance in Public Sector Banks of India. International Journal of Engineering Technology and Management Sciences, 7(5), 103–116. https://doi.org/10.46647/ijetms.2023.v07i05.012
Prayogo, A. I., Nugraha, A., Novanto, T. F., & Kurniawan, J. C. (2024). Enhancing Least Significant Bit Steganography Image Fidelity Using Brotli Compression. Sinkron, 9(1), 285–295. https://doi.org/10.33395/sinkron.v9i1.13186
Ramadhani, A. M., & Hasanuddin, T. (2021). Modifikasi Least Significant Bits pada Gambar sebagai Data Hiding Steganography. Indonesian Journal of Data and Science (IJODAS), 2(2), 91–102. https://doi.org/10.56705/ijodas.v2i3.48
Rantelinggi, P. H., & Saputra, E. (2020). Algoritma Kriptografi Triple Des dan Steganografi LSB sebagai Metode Gabungan dalam Keamanan Data. Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK), 7(4), 661–666. https://doi.org/10.25126/jtiik.2020741838
Rizqa, I., Safitri, A. N., & Harkespan, I. (2022). Kriptostegano Menggunakan Data Encryption Standard dan Least Significant Bit dalam Pengamanan Pesan Gambar. Jurnal Masyarakat Informatika, 13(2), 111–120. https://doi.org/10.14710/jmasif.13.2.44547
Santoso, K. A., Wiraga, A. T., & Riski, A. (2022). Penyembunyian Pesan Terenkripsi pada Citra menggunakan Algoritma LSB dan Transposisi Kolom. Journal of Applied Informatics and Computing, 6(1), 25–30. https://doi.org/10.30871/jaic.v6i1.3819
Sidiq, R. F., Rahayu, R. E. G., & Supriatna, A. D. (2023). Implementasi Kriptografi Advanced Encryption Standard dan Least Significant Bit untuk Keamanan Pesan Email dalam Gambar. Jurnal Algoritma, 20(2), 305–315. https://doi.org/10.33364/algoritma/v.20-2.1407
Sulistyo, I., & Aribowo, E. (2020). Implementasi Algoritma Hybrid dan Metode Least Significant Bit Untuk Keamanan Data. Jurnal Informatika: Jurnal Pengembangan IT, 5(3), 70–76. https://doi.org/10.30591/jpit.v5i3.2050
Syahril, M., & Jaya, H. (2019). Aplikasi Steganografi Pengamanan Data Nasabah di Standard Chartered Bank Menggunakan Metode Least Significant Bit dan RC4. Sensasi, 505–509. http://prosiding.seminar-id.com/index.php/sensasi/issue/archivePage%7C505
Syawal, M. F., Fikriansyah, D. C., & Agani, N. (2016). Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB. Jurnal TICOM, 4(3), 91–99. https://www.neliti.com/publications/93707/
Wati, V., Sa’diyah, H., & Ariyus, D. (2020). Pendekatan Stego-Kripto Mode Cipher Block Chaining Untuk Pengamanan Informasi Pada Citra Digital. JITK (Jurnal Ilmu Pengetahuan Dan Teknologi Komputer), 5(2), 197–204. https://doi.org/10.33480/jitk.v5i2.1160
Wibisono, G., Waluyo, T., & Ujianto, E. I. H. (2020). Kajian Metode Metode Steganografi Pada Domain Spasial. JITK (Jurnal Ilmu Pengetahuan Dan Teknologi Komputer), 5(2), 259–264. https://doi.org/10.33480/jitk.v5i2.1212
Wildan, M., & Ashari, W. M. (2024). Text Data Security Using LCG and CBC with Steganography Technique on Digital Image. Journal of Applied Informatics and Computing, 8(2), 400–407. https://doi.org/10.30871/jaic.v8i2.8457
Yusup, I. M., Carudin, C., & Purnamasari, I. (2020). Implementasi Algoritma Caesar Cipher Dan Steganografi Least Significant Bit Untuk File Dokumen. Jurnal Teknik Informatika Dan Sistem Informasi, 6(3), 434–441. https://doi.org/10.28932/jutisi.v6i3.2817
Zhao, D., & Gao, Y. (2024). Information Security and Privacy Protection Strategies in the Process of Electronic Archiving. Journal of Electrical Systems, 20(6s), 374–380. https://doi.org/10.52783/jes.2658



